We all know the adage:
It is not a question of "IF" you will be hacked, but "WHEN".
This is true for all companies in all industries.
The ultimate answer to this problem is, to quote a famous French film:
"What is important is not the fall, but the landing." (*)
However, when speaking to upper management about cyber risks and the cost to implement remediation or prevention security controls, the answer we often get is a "Don't worry, we will be fine. We can just operate manually with pen and paper until we fix everything again”.
It might be true for (very few) companies, but the reality is unfortunately often much more complicated than that.
A recent example is a cyber-attack that occurred in the Indian Ocean region this week:
Leal Réunion, a car dealership on the Réunion island, got attacked by a hacker group.
This attack is impacting their ability to use their IT systems and some sensitive financial informati...
>>[READ MORE]
A Generic Incident Playbook
#143 - Posted on
16 December 2021 - Author: SM - Category: Guides, Security
Following the work started last year, we have now published a generic incident playbook that should be useful in any type of cyber incident and get your started on how to respond efficiently and rapidly
It is part of the wider set of incident playbooks (17 of them) and is available as a standalone 2x pages PDF on our github page:
ELYSIUMSECURITY Github Incident Playbook page
...
>>[READ MORE]
Log4j vulnerability information and 4x steps to prioritise
#142 - Posted on
14 December 2021 - Author: SM - Category: Security
The aim of this article is to provide some core information about the log4j vulnerability which has been generating a lot of noise in the last few days as well as a list of 4x steps we are recommending based on advice from government agencies and security groups we are a member of.
This vulnerability is serious as it affects a very wide range of devices (CISCO, Checkpoint etc) and applications/services (Vmware vcenter, Apache based website, sentinel one, etc).
It has a CVSS score of 10/10 (critical), the worse possible and allows unauthenticated remote code execution: CVE-2021-44228
The vulnerability affects applications running all versions of log4j before version 2.15.0 and is exploited by sending a specific text string that is interpreted by the log4j library
The Cybersecurity & Infrastructure Security Agency (CISA) has issued some guidance about it: ...
>>[READ MORE]
Programming and Cyber Security
#141 - Posted on
01 October 2021 - Author: SM - Category: Conferences, Security
The Mauritius Python User Group kindly asked me to do a presentation on programming and Cyber Security.
In this presentation, I provide an overview of why knowing programming can make you a better cyber security professional, a look at the most popular languages and some pitfalls to avoid.
You can find the slides to this presentation on slideshare here.
And there was also a video recording available on Youtube.
...
>>[READ MORE]
The WhatsApp Privacy Question
#140 - Posted on
27 January 2021 - Author: SM - Category: Cryptography, Security
With Facebook recently changing its terms and privacy policy for all its WhatsApp users outside of the EU, it seems to have made a lot of people angry.
When it comes to (your) data privacy and what this update means to non-EU WhatsApp’s users, in the end, I believe it does not mean much difference to what existed before! and if you are ok with targeted Marketing then there is no need to do anything different.
Facebook/WhatsApp just put the spotlight on how personal information is being crossed reference and used for marketing purposes. It happened before but it seems more people this time around are more receptive about the implication of such practice and thus it is creating a wave of exode to over more privacy conscious messaging platforms.
Let's ask ourselves 3x basic questions about this situation:
1. What can WhatsApp see now?
WhatsApp cannot see the content of the messages sent through its platform (allegedly, but let’s assume t...
>>[READ MORE]
Free Cyber Incident Playbooks on GitHub
#139 - Posted on
07 November 2020 - Author: SM - Category: Guides, Security
We are in the process of migrating our free resources/download to GitHub in an effort to facilitate the contribution from and to the cyber security community.
The first open source project we uploaded to GitHub is our cryptography project (BUGS) and the second one is our ES Cyber Incident playbooks project.
Our Cyber incident playbooks project is based on the work done by the CERT Societe Generale (SG CERT) which is available for free, under the Creative Commons Attribution 3.0 Unported License, on GitHub. Our project uses the same licensing model and you are free to use the content of our document(s) as per the aforementioned license and with referencing the author(s).
This project provides a number of Incident Response Methodologies (IRM), also called incident playbooks, aimed at helping a company with the handling of different t...
>>[READ MORE]
HOW TO PROTECT AGAINST THE NEW PHISHING ATTACKS GETTING AROUND MFA (CONSENT PHISHING)
#138 - Posted on
20 August 2020 - Author: SM - Category: Security, Hacking
There is a growing type of phishing attack which has been quite successful since the beginning of 2020, it is called a "Consent Phishing"
Traditional email phishing attacks will try to get the victim's credentials through a dangerous URL with a fake login webpage, a malware attachment or some other clever social engineering tactics.
Hopefully companies have some anti-phishing tools/technology to detect and protect them against most of those type of emails (some always manage to get through, no matter what technology you use and what vendors promise you!)
However, there is a new type of phishing attacks that leverages the OAuth authorisation framework used by some applications to access your account. Basically, there are a lot of legitimate applications that will request access to your O365 account (it could also be another type of Cloud app provider) through the generation of an OAuth token, so they don't need to know (and store) your O365 password.
...
>>[READ MORE]
SOME CYBER INSURANCE CLAIMS IMPACTED BY COVID-19?
#137 - Posted on
29 April 2020 - Author: SM - Category: Security
Below is a link to an interesting article arguing that cyber insurance claims might be affected by the recent surge of working from home, and especially working from a personal computer/endpoint.
DARKREADING ARTICLE
It opens up to a wider question as to whether or not the COVID-19 will have an impact on some (other) cyber insurance claims.
What we have seen from various online publications, specialised forums and discussions is a consensus towards the following answer: "probably not".
Taking into consideration what the above article is discussing, the answer is actually "probably not directly".
As companies/employees are setting up new ways of working, most of the time in a hurry, consideration of the potential impact on their cyber insurance is probably not at the top of their list.
One possible way to look at th...
>>[READ MORE]
FREE CYBER SECURITY TESTING FOR SMALL BUSINESSES IN MAURITIUS
#136 - Posted on
03 April 2020 - Author: SM - Category: Security
Starting on the 6th of April, ELYSIUMSECURITY will offer a free service for the community in Mauritius. If you are a small business who has recently setup an online shopping website we can test the security of your website/platform at no charge and provide you with a short report on potential security vulnerabilities alongside some practical advice on how to fix them.
In these difficult times it is very important to help each other. More and more people are now looking at remote shopping online (we are!), so it is important those new websites do not get hacked and we can all continue to use those online services.
Below are the key points of this free service:
100% free with no future commitment or “after sale” nonsense, it is our way to say thank you to all those businesses and services that help the community in those hard times;
You will need to provide proof your own the website/service to be tested;
We will enter into a simplifie...
>>[READ MORE]